Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System

Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System

IPFire 2.29 Core Update 198 marks a significant advancement for users of this open-source firewall, introducing enhanced Intrusion Prevention System (IPS) capabilities powered by Suricata 8.0.1.

This release emphasizes improved network monitoring through innovative reporting tools, alongside toolchain rebasing and extensive package updates to bolster security and performance.

Designed for both small offices and large enterprises, the update addresses long-standing user requests for better visibility into security events, ensuring administrators can respond swiftly to threats.

The standout addition in IPFire 2.29 is the new IPS reporting suite, which transforms how network activity is tracked and documented.

Administrators can now receive immediate email notifications for alerts exceeding a user-defined threshold, ensuring critical incidents are flagged in real-time without sifting through logs.

Enhanced IPS Reporting Features

Scheduled PDF reports, generated daily, weekly, or monthly, offer comprehensive summaries of all alerts in a readable format suitable for archiving or sharing with stakeholders.

google

Additionally, alerts can be forwarded to remote syslog servers, providing an independent log trail that survives potential firewall compromise for robust forensic analysis.

These features enhance auditability, allowing teams to maintain verifiable records of threat detection and response, even in adversarial scenarios.

A sample PDF report demonstrates the clarity of these outputs, including event timelines and severity highlights. By extending IPS data beyond the device itself, IPFire strengthens operational accountability and simplifies compliance efforts.

Upgrading to Suricata 8.0.1, the IPS now caches compiled rules for faster startups and includes more resilient memory management.

Expanded protocol support covers DNS-over-HTTP/2, Multicast DNS, LDAP, POP3, SDP in SIP, SIP over TCP, and WebSocket, enabling deeper traffic inspection.

On ARM architectures, the Vectorscan library optimizes pattern matching using advanced vector instructions, delivering sharper performance in resource-constrained environments.

These enhancements ensure the IPS remains efficient against evolving threats while minimizing overhead on hardware.

The IPFire toolchain has been rebased on GNU Compiler Collection 15.2.0, GNU Binutils 2.42, and GNU glibc 2.42, incorporating bug fixes, security patches, and performance gains.

A broad array of packages received updates, including BIND 9.20.13 for DNS stability, cURL 8.16.0 for secure transfers, and sudo 1.9.17p2 for privilege management improvements.

Intel’s latest microcode addresses recent processor vulnerabilities, while GRUB has been fortified against multiple exploits.

Notably, responsible disclosure from VulnCheck and Pellera Technologies revealed 18 web UI vulnerabilities due to insufficient input validation from browsers.

These have been patched and assigned CVEs from 2025-34301 to 2025-34318, all rated with potential for cross-site scripting or injection if exploited by authenticated admins.

CVE ID Description Bugzilla ID CVSS Score (Estimated)
CVE-2025-34301 Web UI input validation flaw #13876 Medium (6.1)
CVE-2025-34302 Web UI input validation flaw #13877 Medium (6.1)
CVE-2025-34303 Web UI input validation flaw #13878 Medium (6.1)
CVE-2025-34304 Web UI input validation flaw #13879 Medium (6.1)
CVE-2025-34305 Web UI input validation flaw #13880 Medium (6.1)
CVE-2025-34306 Web UI input validation flaw #13881 Medium (6.1)
CVE-2025-34307 Web UI input validation flaw #13882 Medium (6.1)
CVE-2025-34308 Web UI input validation flaw #13883 Medium (6.1)
CVE-2025-34309 Web UI input validation flaw #13884 Medium (6.1)
CVE-2025-34310 Web UI input validation flaw #13885 Medium (6.1)
CVE-2025-34311 Web UI input validation flaw #13886 Medium (6.1)
CVE-2025-34312 Web UI input validation flaw #13887 Medium (6.1)
CVE-2025-34313 Web UI input validation flaw #13888 Medium (6.1)
CVE-2025-34314 Web UI input validation flaw #13889 Medium (6.1)
CVE-2025-34315 Web UI input validation flaw #13890 Medium (6.1)
CVE-2025-34316 Web UI input validation flaw #13891 Medium (6.1)
CVE-2025-34317 Web UI input validation flaw #13892 Medium (6.1)
CVE-2025-34318 Web UI input validation flaw #13893 Medium (6.1)

Add-on packages like HAProxy 3.2.4, nginx 1.29.1, and Samba 4.22.4 also saw updates, extending IPFire’s versatility for advanced deployments. This release solidifies IPFire’s role as a reliable, evolving security cornerstone.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link